Terminator for Spam - A Fuzzy Approach Revealed

Size: px
Start display at page:

Download "Terminator for Spam - A Fuzzy Approach Revealed"

Transcription

1 Terminator for Spam - A Fuzzy Approach Revealed P.SUDHAKAR 1, G.POONKUZHALI 2, K.THIAGARAJAN 3, K.SARUKESI 4 1 Vernalis systems Pvt Ltd, Chennai Department of Computer Science and Engineering, Rajalakshmi Engineering College, Affiliated to Anna University- Chennai, Tamil Nadu 3 Department of Science and Humanities, KCG College of Technology Affiliated to Anna University-Chennai, Tamil Nadu 4 Hindustan Institute of Technology and Science-Chennai,Tamil Nadu INDIA 1 sudhakar.asp@gmail.com, 2 poonkuzhali.s@rajalakshmi.edu.in, 3 vidhyamannan@yahoo.com, 4 profsaru@gmail.com Abstract - In this information technology world, the highest degree of communication happens through s. Realistically most of the inboxes are flooded with spam s as most of transactions through this internet is affected by Passive attacks and Active attacks. Several algorithms exist in the e-world to defend against spam s. But the fulfilment of accuracy in deducting spam is still oscillating between 80-90%. This clearly shows the necessity for improvement in spam control algorithms on various projections. In this proposed work a new solvent was chosen in the fuzzy word to combat against spam e- mails. Various fuzzy rules are created for spam s and every is enforced to pass through fuzzy rule filter for identifying spam. Results of the each fuzzy rule for the input e- mails are derived to classify the to be spam or consent. Key-Words - , spam, Fuzzy, Fuzzy Control, Fuzzy logic, Spam, Spam deduction, User Attitude. E I. INTRODUCTION -mail spam, known as unsolicited bulk (UBE), junk mail, or unsolicited commercial (UCE), is the practice of sending unwanted messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. Spam in started to become a problem when the Internet was opened up to the general public in the mid-1990s. It grew exponentially over the following years, and today composes some 80 to 85% of all the in the world, by a "conservative estimate". Pressure to make spam illegal has been successful in some jurisdictions, but less so in others [1]. Spammers take advantage of this fact, and frequently outsource parts of their operations to countries where spamming will not get them into legal trouble. Though, is undoubtedly a very effective method of communication these days but at times it can be quite vexing when one is confronted with so many unwanted s where the recipients miss their important s just because their mailbox space is often eaten up by these unwanted s. The legal status of spam varies from one jurisdiction to another. Spammers collect addresses from chat rooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. They also use a practice known as " appending" or "epending" in which they use known information about their target (such as a postal address) to search for the target's address. Much of spam is sent to invalid addresses. Spam averages 78% of all sent. According to the Message Anti-Abuse Working Group, the amount of spam was between 88-92% of messages sent in the first half of Most of the inbox is flooded with these Spams which occupies lot of memory space. There are several algorithms available for detecting and filtering spam e- mails. Among the existing algorithms, Bayesian filtering produces best result, still it does not detect all the spam e- mails. Most of the existing algorithms considers content alone for filtering the spam s. To detect all the spam s, existing spam filtering methods has to be enhanced. In this proposed work, a new algorithm is devised with various fuzzy rules and fuzzy variables. Each fuzzy rule will produce Attack Factor values which are consider for arriving result. Each rule Attack Factor value was arrived by comparing input parameter against Black list and White List. Black list contains predetermined spam content. White list contains acceptable contents. This final result from above calculated Attack Factor will decide the input content to be spam or ham or to be sent hold state. The final result of the algorithm was obtained by summing up each rule result value and decision was taken based on the result of the individual rules. 332

2 i. RELATED WORKS Xavier Carreras et al.[2] proposed a Boosting algorithm for Anti Spam filtering. Even though Boosting algorithm delivers good result, possibility of misclassification costs persist inside the AdaBoost learning algorithm. William W. Cohen et al.[3] suggested Speech act theory for filtering. The outcome of Speech act theory highly depend on the learning and this approach shows new projection for classifying spam content. Harris Drucker et al.[7] developed support vector Machines for Spam Categorization. Even though support vector approach outperforms well, switching from training model need user intervention. Addition to that, reply s are considered as no spam. Joes M.Gomez Hidalgo et al.[8] presents a new dimension for spam classification. Nikolos et al.[13] implemented new technique for spam categorization couple with header information and content information. However this system is under research in peer to peer networks. Even though the conceptualization is good, but the practical bottle neck will comes for identification of spam words from the global set. This will take large amount of time as it works with centralized architecture. Peng et al.[9] Proprosed a new system for applying spam filter in distributed environment. The proposed techniques out performs well during implementation of spam filter in the distributed system. But Author fails to state the technique that can be used to identify spam based on content. The technique handled in this approach ( copy rank ) performs based on header rather than header and body content. Wanli et al.[10] projected a new techniques for identifying spam of content type image. But the experimental results shows less confidence on their approach due to misclassification. From the misclassification list, image based classification got highest rank over other text, HTML and non English text classifications. Sadegh et al.[12] follow through a new approach called Bayesian spanning tree with Likelihood function to identify the in the space. From the likelihood classification, Bayesian Spanning Tree outperforms well compared to Navie Bayesian approach by considering precision and F-measure as measurement. Nevertheless Bayesian approach produces high result, still there is a large space to reach 100% accuracy. Bayesian precision measure declares at the maximum of 85% efficiency can be obtained by using Bayesian spanning tree. ii. OUTLINE OF THE DOCUMENT Section 2 composes various fuzzy rules formation for the input parameters to identify the as a spam or consent. Section 3 Implements the fuzzy rules formed over input (s). Section 4 predicts the input and categorize into appropriate buckets. Section 5 proposes results and discussion on the results with future work. II. FUZZY SYSTEM AND FUZZY RULES GENERATION Fuzzy Logic (FL) is a problem-solving control system methodology that lends itself to implementation in systems ranging from simple, small, embedded microcontrollers to large, networked, multi-channel PC or workstation-based data acquisition and control systems. It can be implemented in hardware, software, or a combination of both. FL provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. FL's approach to control problems mimics how a person would make decisions, only much faster. Fuzzy rules have been advocated as a key tool for expressing pieces of knowledge in fuzzy logic i. FUZZYFICATION Input variable : {Sender saddress, Sender_IP, Subject_Words, ContentWords, Attachment} Fuzzy set : {positive, Zero, Negative} Linguistic set : (highpositive, highnegative, Zero} Rule 1: a: IF SenderAddress spammer list AttackFactor=-0.25; b: IF SenderAddress to Ham list AttackFactor=0.25; c : IF Sender Address Spammerlist & Sender address Ham addresslist AttackFactor=0; Explanation: Rule 1.a : If there exist a sender address belongs to spammer list, then Attack Factor of this rule should be set to -0.25; Rule 1.b : If there exist a sender address belongs to Ham list then, Attack Factor of this rule should be set to 0.25; Rule 1.c : If there exist a sender address that doesn t belongs to spammer list and Ham list then, Attack Factor of this rule should be set to 0; 333

3 Rule 2 : a: IF Sender_IP SpammerIPlist AttackFactor= -0.25; b: IF Sender_IP HamIPlist AttackFactor=0.25; c: IF Sender_IP SpammerIPlist & HamIPlist AttackFactot=0; Explanation: Rule 5.a : If all attachment doesn t belong to virus list then, Attack Factor of this rule is set to 1.0; Rule 5.b : If there exist an attachment belongs to virus list, then Attack Factor of this rule is set to -1.0; Explanation: Rule 2.a : If there exists a sender IP address belongs to Spammer list, then Attack Factor of this rule should be set to -0.25; Rule 2.b : if there exists a sender IP address belongs to Ham list, then Attack Factor of this rule was set to 0.25; Rule 2.c : If there exists a sender IP address doesn t belongs to Spammer list and Ham List then Attack Factor of this rule was set to 0; III. FUZZY RULE IMPLEMENTATION Rule 3: a: IF Subject words Spam words AttackFactor= -0.50; b: IF Subjectword Spamwords <AttackFactor< 0.50 Explanation: Rule 3.a: If all Subject words belongs to Spam words then, Attack Factor of this rule should be set to -0.50; Rule 3.b : If there exists a subject word that belongs to spam word then Attack Factor of this rule is varies from to +0.50; Rule 4: a: IF Content words Spamwordlist AttackFactor= -0.50; b: IF Content words Spamwordslist <AttackFactor< 0.50; Explanation: Rule 4.a : If all content words belongs to Spam words then, Attack Factor of this rule should be set to -0.50; Rule 4.b : If there exists an content word that belongs to spam word then Attack Factor of Rule 5 : this rule is varies from to +0.50; a: IF Attachment VirusList AttackFactor=1.0; b: IF Attachment Visuslist AttackFactor= -1.0; Figure 1. Architecture of proposed system When an is arrived, identified fuzzy input parameters are extracted and it is passed to fuzzy system for identification as per Figure1. After Fuzzyfication and Defuzzyfication categorized s are send back to user. Detailed internal follow was shown in Figure 2. Rule 1 was applied on Fuzzy input parameter- Sender address. Based on Rule 1, Sender address was extracted from and compared against the Black list which has spammer address list. If any match was found then, Attack Factor for this rule was set to If sender address was not found in the black list, then it was compared against the White list which contains all good and acceptable addresses. If match was found, then attack factor for this rule was set to If sender address was not found in both Black and White list, then attack factor for this rule was set to 0. Set this rule result in R1. Rule 2 was applied on Fuzzy Input parameter- Sender IP. IP Address of the sender was compared against the IP Address Black List. If match was found, then Rule 2 Attack Factor was set to If not found, then Sender IP Address was compared against White List IP Address. 334

4 If match found then attack factor of Rule 2 was set to If not found then Attack Factor of the Rule 2 was set to 0. Assign resultant value in R2. Rule 3 was applied on Fuzzy input parameter- Subject words. An may contain one or more words in subject line. All subject word and Content words are preprocessed. The pre-process contains the following steps i.e. stemming, stop words elimination and tokenization. Stemming is the process of comparing the root forms of the searched terms to the documents in its database. Stop words elimination is the process of not considering certain words which will not affect the final result. Tokenization is defined as splitting of the words into small meaning full constituents Algorithm for Subject Attack Factor Calculation: Step 1 :Split the Subject content into words say W i where n i 1 Step 2 : assign to T w = n Step 3 :Calculate word Impact Factor W f where W f = 0.5 /T w Step 4 :Perform comparison for each word W i in Black list Step 5 :If match found then update the update W fi = - W f else W fi = W f ; where i <= T w ; Step 6 : Calculate Attach Factor = Step 7 : Calculate R3 = ; From the subject line after pre-processing total words are counted and each word impact on for this rule is calculate. i,e average impact. Now each word are compared against black and white list already available. If it is found in white list then the Attack factor for this word is set as positive. If it is found in black list then the Attack factor was set as negative. Example : Total words = 5 W f = 0.5 / 5 = 0.1 If the word W i is present in While list then the AttackFactor = If the word Wi is present in the Black list then the Attack Factor = Rule 4 was applied on Fuzzy Input variable- ContentWords after Pre-Processing. Every body may contain one or more words. Every words are taken and compared against the Block list words. Following are the Algorithm to compute Attack Factor of Rule 4. Algorithm for Content Attack Factor Calculation: Step 1 :Split the bodycontent to words say W i where i 1 Step 2: Count the total number of words in Bodyand assign to Tw Step 3 : If T w > 0 then continue Step 4. Step 4 :Calculate word impact factor W f where W f = 0.5 /T w Figure 2. Detailed system flow After pre processing all words are taken and compared against the Black list words. Every words impact (Attack Factor) on this subject line was calculated. Following are Algorithm to compute Attack Factor of Rule 3 Step 5 :Perform comparison for each word Wi in Black list Step 6 :If match found then update the update W fi = - W f else W fi = W f ; where i Tw; Step 7 :Calculate Attach Factor = Step 8 : Calculate R4 = ; Rule 5 was applied to calculate Attack Factor for containing attachment. If does not contain Attachment, then Attack Factor was set to zero. If any one of the attachment content was identified in virus list then Attack Factor was set to -1. If none of the content 335

5 was identified in virus list, then Attack Factor was set to 1. Rule 5 result was assigned to R5. Defuzzification: Result value of each was arrived by sum up previous rule results and these results are termed as decision making factors. R1 = R1; R2 = R2 + R1; R3 = R3 + R2; R4 = R4 + R3; R5 = R5 + R4; IV. RESULTS BASED ON USER ATTITUDE AND DISCUSSION Every rule results are obtained and user attitude was taken consideration for categorizing input s. User Attitude was initially configured to take decision based on fuzzy Linguistic set {High Positive, zero, high negative}. High positive users are type of user who strictly restricts spam s. Zero level users are neutral user who does not have restriction. High negative users are more interested in receiving spam s. Following are the possible values of the Linguistic Set High Positive 0.25; Zero = 0; High Negative Decision making for High Negative level user: If user s attitude level was set High Negative and all rule result value is then the e- mail is declared as consent. If user s attitude level was set as High Negative and any one the rule result value is < then the is set to Hold in which user can take final decision. All fuzzy rules are applied over 243 different kind of e- mails using fuzzy input variables: Sender s Address, Sender, Subject Words, Content Words and Attachment. Results of some sample s are distributed in the following tables. Table 1. Results based on Fuzzy Rules with High positive user Attitude E- mail Fuzzy Results Sour ce Rule1 Rule2 Rule3 Rule4 Rule5 Result E Consent E Spam E Hold E Consent E Spam E Hold Following are the decision making process. Decision making for High positive level users: If user s attitude was set as high positive and all applied rules values are > 0.25 then the is declared as consent. If user s attitude was set as high positive and any one of the rule result value various between 0.25 to 0 then the is declared as hold. If user s attitude was set as high positive and any one of the rule value is < 0 then the is set to Spam. Decision making for Zero level user: If user s attitude level was set as Zero and all rule result value is 0 then the is declared as consent. If user s attitude level was set as Zero and any one of rule value is < 0 then the is set to Spam. Figure 3. Graphical representation of Table 1 336

6 Table 2. Results based on Fuzzy user with Zero user Attitude Source Fuzzy Results Rule1 Rule2 Rule3 Rule4 Rule5 Result E Consent E Spam E Consent E Consent E Spam E Consent Figure 5. Graphical representation of Table 3 Table 4 : Results based on Fuzzy Rules with different user Attitudes ES R1 R2 R2 R4 R5 HP Z HN E Consent Consent Consent E Hold Consent Consent E Hold Consent Consent E Spam Spam Spma E Spam Spam Consent E Hold Consent Consent Figure 4. Graphical representation of Table2 From Fig 4 represents nature. If we see any that has negative region then the is set to spam. From the graph we can identify E2 and E5 are spam as it grows in negative region. Table 3. Results based on Fuzzy Rules with high negative user Attitude E- mail Fuzzy Results Sourc e Rule1 Rule2 Rule3 Rule4 Rule5 Result E Spam E Consent E Consent E Spam E Consent E Consent From table 3 the results can be easily predicted that the relaxation of user who intentionally wish to accept spam s, user level was set to So the range from and above the s are categorized as Consent. Below the level, s are categorized as Hold. The same was represented in a graphical manner in Fig 4. ES Source RX Rule X where X varies from 1 to 5 HP High Positive user Attitude Z - Zero user Attitude HN High Negative user Attitude Table 4 Consolidates different user projections on the same with samples. All possible combination results are provided in Appendix different sets of s are taken for evaluation and results are represented in following figures Figure 6. High positive user s attitude Out of 243 s based on high positive user s attitude, 22 e-malis are categorized as Consent, 41 e-malis are 337

7 categorized in Hold state and 180 s are stamped as spam. Acknowledgment The authors would like to thank Dr. Ponnammal Natarajan worked as Former Director Research, Anna University- Chennai,India and currently an Advisor, (Research and Development), Rajalakshmi Engineering College and Dr. K..Ravi, Associate Professor, Department of Mathematics, Sacred Heart College- Tirupattur, India for their intuitive ideas and fruitful discussions with respect to the paper s contribution. REFERENCES Figure 7. Zero level user s attitude Out of 243 s based on zero level user s attitude, 68 e-malis are categorized as Consent and 180 s are stamped as spam. Figure 8. High Negative user s attitude Out of 243 s based on High Negative user s attitude, 112 e-malis are categorized as Consent and 131 s are categorized as Hold. CONCLUSION AND FUTURE WORK In this proposed work, Fuzzy rules are constructed for 5 input parameters namely Sender s Address, Sender_IP, Subject_Words, Content Words and Attachment for common user to deduct the spam s based on the attitude of the user. The proposed simplistic approach out performs in terms of accuracy in deducting spam s than the existing approaches provided the Black list and White lists to be up to date. The proposed approach works only for s having subject and body content as plain text. Future work aims at deducting spam s having images and HTML also. [1] Metrics report [2] Carreras, X. and Mdrquez, L., Boosting trees for anti-spare filtering, In Proc. of RANLP, [3] Cohen, W.W., Learning Rules that Classify ., Proceedings. of the AAAI Spring Symposium on Machine Learning in Information Access, Stanford, California,1996. [4] Cournane, A. and Hunt, R., An Analysis of the Tools Used For the Generation and Prevention of Spam, Computer and Security, Vol. 23, pp , [5] Cox, E., The Fuzzy System Handbook, Academic Press, Second Edition, [6] Daelemans, W., Z. Jakub, K. van der [7] Sloot and A. van den Bosch, TiMBL: Tilburg Memory Based Learner, version 2.0, Reference Guide. ILK,Computational Linguistics, Tilburg University [8] Drucker, H., Wu, D., & Vapnik, V., Support vector machines for Spam categorization. IEEE-NN, Vol. 10, No.5, pp ,1999. [9] Graham, P., Better Baysian Filtering. In Proceedings of Spam Conference [10] Peng Liu, Guangliang Chen, Liang Ye, Weiming Zhong, Proceedings of the 5th WSEAS Int. Conf. On Simulation, Modeling and Optimization, Corfu, Greece, August 17-19, 2005 (pp61-66). [11] Wanli Ma, Dat Tran, Dharmendra Sharma, Sen Li, Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, [12] Hidalgo, J. G., Spez, M, and Sanz, E, Combining text and heuristicz for cost-sensitive spam filtering. In Proc. of CONL, [13] Sadegh Kharazmi, Ali FarahmandNejad, Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, [14] Nikolaos Korfiatis, Marios Poulosy, Sozon Papavlassopoulos, Proceeding of the WSEAS International Conference on Applied Mathematics, Greece, Aug 19, 2004 ( ). [15] Lee, J., Spam: An escalating attack of the clones, The New York Times, [16] Mayer, C., and Eunjung-Cha, A., Making spam go splat: Sick of unsolicited , [17] businesses are fighting back, The Washington Post, [18] Norvig P. and Russell S., Artificial Intelligence A Modern Approach, Prentice Hall, New Jersey, [19] Nozaki, K., Ishibushi, H. and Tanaka, H., Trainable Fuzzy classification systems based on Fuzzy If-Then-Rules, Proc. IEEE, vol. 1, pp , [20] RFC 822: Standard for the Format of Arpa Internet Text Messages, [21] Sahami, M., Dumais, S., Heckerman, D. and Horvitz, E., A Bayesian Approach to Filtering Junk . In Learning for Text Categorization, AAA1 Workshop, pp , Madison Wisconsin, [22] SpamAssassin,

8 [23] Sudhakar.P, Poonkuzhali.S, Thiagarajan.K and Sarukesi.K., Fuzzy Logic for Spam deduction, Proceedings of the WSEAS 10th International Conference on Applied Computer and Applied Computational Science, Venice, Italy, March 8-10, 2011 ISBN: [24] Poonkuzhali.S, Thiagarajan.K, P.Sudhakar Kishore Kumar.R and Sarukesi.K., Spam Filtering using Signed and Trust Reputation Management, Proceedings of the WSEAS 10th International Conference on Applied Computer and Applied Computational Science, Venice, Italy, March 8-10, 2011 ISBN: P.Sudhakar received Bachelor of Engineering degree in Computer science from Anna University Chennai-India in 2006 and Master of Engineering degree in Computer Science from Anna University Chennai-India in He started his carrier as a Junior software programmer in Vernalis systems Pvt Ltd, Chennai India at 2008 and elevated to Associate software. He also presented various papers in National level conferences and published his research work in International Conferences and Journals. G.Poonkuzhali received B.E degree in Computer Science and Engineering from University of Madras, Chennai, India, in 1998, and the M.E degree in Computer Science and Engineering from Sathyabama University, Chennai, India, in Currently she is pursuing Ph.D programme in the Department of Information and Communication Engineering at Anna University Chennai, India. She has presented and published 10 research papers in international conferences & journals and authored 5 books. She is a life member of ISTE (Indian Society for Technical Education),IAENG (International Association of Engineers), and CSI (Computer Society of India). K.Thiagarajan working as Senior Lecturer in the Department of Mathematics in KCG College of Technology - Chennai-India. He has totally 14 years of experience in teaching. He has attended and presented research articles in 33 National and International Conferences and published one national journal and 26 international journals. Currently he is working on web mining through automata and set theory. His area of specialization is coloring of graphs and DNA Computing. Dr. K. Sarukesi has a very distinguished career spanning of nearly 40 years. He has a vast teaching experience in various universities in India and abroad. He was awarded a commonwealth scholarship by the association of common wealth universities, London for doing Ph.D in UK. He completed his Ph.D from the University of Warwick U.K in the year His area of specializations is Technological Information System. He worked as expert in various foreign universities. He has executed number of consultancy projects. he has been honored and awarded commendations for his work in the field of information technology by the government of TamilNadu. He has published over 40 research papers in international conferences/journals and 40 National Conferences/journals. 339

9 Appendix -1 Source Fuzzy Rules High Positive Zero High Negative Rule1 Rule2 Rule3 Rule4 Rule5 Consent Hol d Spa m Consent Spam Consent E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES Hol d 340

10 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 341

11 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 342

12 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 343

13 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 344

14 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 345

A MATHEMATICAL APPROACH FOR FILTERING JUNK USING RELEVANCE ANALYSIS

A MATHEMATICAL APPROACH FOR FILTERING JUNK  USING RELEVANCE ANALYSIS A MATHEMATICAL APPROACH FOR FILTERING JUNK E-MAIL USING RELEVANCE ANALYSIS S.SathyaBama Assistant Professor, Department of MCA, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, INDIA M.S.Irfan

More information

An Empirical Performance Comparison of Machine Learning Methods for Spam Categorization

An Empirical Performance Comparison of Machine Learning Methods for Spam  Categorization An Empirical Performance Comparison of Machine Learning Methods for Spam E-mail Categorization Chih-Chin Lai a Ming-Chi Tsai b a Dept. of Computer Science and Information Engineering National University

More information

Schematizing a Global SPAM Indicative Probability

Schematizing a Global SPAM Indicative Probability Schematizing a Global SPAM Indicative Probability NIKOLAOS KORFIATIS MARIOS POULOS SOZON PAPAVLASSOPOULOS Department of Management Science and Technology Athens University of Economics and Business Athens,

More information

Relevance Ranking and Evaluation of Search Results through Web Content Mining

Relevance Ranking and Evaluation of Search Results through Web Content Mining elevance anking and Evaluation of Search esults through Web Content Mining G Poonkuzhali, Kishore Kumar, P Sudhakar, GVUma, KSarukesi Abstract Nowadays, most of the people rely on web search engines to

More information

Static Program Slicing for Composite Data using FSM-Model

Static Program Slicing for Composite Data using FSM-Model Static Program Slicing for Composite Data using FSM-Model K. Thiagarajan, C.Saravanakumar, G. Poonkuzhali, Ponnammal Natarajan, S.Jeyabharathi Abstract In the software development life cycle, the identification

More information

Accuracy Analysis of Neural Networks in removal of unsolicited s

Accuracy Analysis of Neural Networks in removal of unsolicited  s Accuracy Analysis of Neural Networks in removal of unsolicited e-mails P.Mohan Kumar P.Kumaresan S.Yokesh Babu Assistant Professor (Senior) Assistant Professor Assistant Professor (Senior) SITE SITE SCSE

More information

Sathyamangalam, 2 ( PG Scholar,Department of Computer Science and Engineering,Bannari Amman Institute of Technology, Sathyamangalam,

Sathyamangalam, 2 ( PG Scholar,Department of Computer Science and Engineering,Bannari Amman Institute of Technology, Sathyamangalam, IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 8, Issue 5 (Jan. - Feb. 2013), PP 70-74 Performance Analysis Of Web Page Prediction With Markov Model, Association

More information

SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS

SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS Abstract U.V.ARIVAZHAGU * Research Scholar, Sathyabama University, Chennai, Tamilnadu, India arivu12680@gmail.com Dr.S.SRINIVASAN Director

More information

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER N. Suresh Kumar, Dr. M. Thangamani 1 Assistant Professor, Sri Ramakrishna Engineering College, Coimbatore, India 2 Assistant

More information

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.

More information

STUDYING OF CLASSIFYING CHINESE SMS MESSAGES

STUDYING OF CLASSIFYING CHINESE SMS MESSAGES STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION 1 LI FENG, 2 LI JIGANG 1,2 Computer Science Department, DongHua University, Shanghai, China E-mail: 1 Lifeng@dhu.edu.cn, 2

More information

A Simulation Based Comparative Study of Normalization Procedures in Multiattribute Decision Making

A Simulation Based Comparative Study of Normalization Procedures in Multiattribute Decision Making Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Corfu Island, Greece, February 16-19, 2007 102 A Simulation Based Comparative Study of Normalization

More information

A Level-wise Priority Based Task Scheduling for Heterogeneous Systems

A Level-wise Priority Based Task Scheduling for Heterogeneous Systems International Journal of Information and Education Technology, Vol., No. 5, December A Level-wise Priority Based Task Scheduling for Heterogeneous Systems R. Eswari and S. Nickolas, Member IACSIT Abstract

More information

PERFORMANCE OF MACHINE LEARNING TECHNIQUES FOR SPAM FILTERING

PERFORMANCE OF MACHINE LEARNING TECHNIQUES FOR  SPAM FILTERING PERFORMANCE OF MACHINE LEARNING TECHNIQUES FOR EMAIL SPAM FILTERING M. Deepika 1 Shilpa Rani 2 1,2 Assistant Professor, Department of Computer Science & Engineering, Sreyas Institute of Engineering & Technology,

More information

Collaborative Spam Mail Filtering Model Design

Collaborative Spam Mail Filtering Model Design I.J. Education and Management Engineering, 2013, 2, 66-71 Published Online February 2013 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2013.02.11 Available online at http://www.mecs-press.net/ijeme

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

Filtering Spam Using Fuzzy Expert System 1 Hodeidah University, Faculty of computer science and engineering, Yemen 3, 4

Filtering Spam Using Fuzzy Expert System 1 Hodeidah University, Faculty of computer science and engineering, Yemen 3, 4 Filtering Spam Using Fuzzy Expert System 1 Siham A. M. Almasan, 2 Wadeea A. A. Qaid, 3 Ahmed Khalid, 4 Ibrahim A. A. Alqubati 1, 2 Hodeidah University, Faculty of computer science and engineering, Yemen

More information

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

More information

Diagnosis of Spams Some Statistical Considerations

Diagnosis of  Spams Some Statistical Considerations International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 4 (August 2012), PP. 05-09 Diagnosis of Email Spams Some Statistical Considerations

More information

Advanced Spam Detection Methodology by the Neural Network Classifier

Advanced  Spam Detection Methodology by the Neural Network Classifier Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Content Based Spam Filtering

Content Based Spam  Filtering 2016 International Conference on Collaboration Technologies and Systems Content Based Spam E-mail Filtering 2nd Author Pingchuan Liu and Teng-Sheng Moh Department of Computer Science San Jose State University

More information

Keywords : Bayesian, classification, tokens, text, probability, keywords. GJCST-C Classification: E.5

Keywords : Bayesian,  classification, tokens, text, probability, keywords. GJCST-C Classification: E.5 Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 13 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

Non-ML Anti-Spamming: A Role Based Solution

Non-ML Anti-Spamming: A Role Based Solution Non-ML Anti-Spamming: A Role Based Solution Anthony Y. Fu, Email: anthony@cs.cityu.edu.hk WebPage: http://www.cs.cityu.edu.hk/~anthony Department of Computer Science, City University of Hong Kong Hong

More information

Use and Abuse of Anti-Spam White/Black Lists

Use and Abuse of Anti-Spam White/Black Lists Page 1 of 5 Use and Abuse of Anti-Spam White/Black Lists September 26, 2006 White and Black lists are standard spam filters. Their typically simple interface, provide a way to quickly identify emails as

More information

Information Extraction from Spam s using Stylistic and Semantic Features to Identify Spammers

Information Extraction from Spam  s using Stylistic and Semantic Features to Identify Spammers Information Extraction from Spam using Stylistic and Semantic Features to Identify Spammers Soma Halder University of Alabama at Birmingham soma@cis.uab.edu Richa Tiwari University of Alabama at Birmingham

More information

Velammal Engineering College Department of Computer Science and Engineering

Velammal Engineering College Department of Computer Science and Engineering Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal

More information

Introduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple

Introduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple Table of Contents Introduction...2 Overview...3 Common techniques to identify SPAM...4 Greylisting...5 Dictionary Attack...5 Catchalls...5 From address...5 HELO / EHLO...6 SPF records...6 Detecting SPAM...6

More information

Meta-Content framework for back index generation

Meta-Content framework for back index generation Meta-Content framework for back index generation Tripti Sharma, Assistant Professor Department of computer science Chhatrapati Shivaji Institute of Technology. Durg, India triptisharma@csitdurg.in Sarang

More information

On Effective Classification via Neural Networks

On Effective  Classification via Neural Networks On Effective E-mail Classification via Neural Networks Bin Cui 1, Anirban Mondal 2, Jialie Shen 3, Gao Cong 4, and Kian-Lee Tan 1 1 Singapore-MIT Alliance, National University of Singapore {cuibin, tankl}@comp.nus.edu.sg

More information

Text Classification for Spam Using Naïve Bayesian Classifier

Text Classification for  Spam Using Naïve Bayesian Classifier Text Classification for E-mail Spam Using Naïve Bayesian Classifier Priyanka Sao 1, Shilpi Chaubey 2, Sonali Katailiha 3 1,2,3 Assistant ProfessorCSE Dept, Columbia Institute of Engg&Tech, Columbia Institute

More information

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry

More information

SCSUG 2017 Classifying and Predicting Spam Messages using Text Mining in SAS Enterprise Miner

SCSUG 2017 Classifying and Predicting Spam Messages using Text Mining in SAS Enterprise Miner SCSUG 2017 Classifying and Predicting Spam Messages using Text Mining in SAS Enterprise Miner Mounika Kondamudi, Oklahoma State University, Mentored by Balamurugan Mohan, H&R Block Abstract In this technologically

More information

Ethical Hacking and. Version 6. Spamming

Ethical Hacking and. Version 6. Spamming Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How

More information

Increasing the Accuracy of a Spam-Detecting Artificial Immune System

Increasing the Accuracy of a Spam-Detecting Artificial Immune System Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University 1125 Colonel By Drive Ottawa, ON K1S 5B6 terri@zone12.com Tony White Carleton University 1125 Colonel

More information

I. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching

I. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching A Comparative Analysis on Fingerprint Binarization Techniques K Sasirekha Department of Computer Science Periyar University Salem, Tamilnadu Ksasirekha7@gmail.com K Thangavel Department of Computer Science

More information

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR Kunjali Pawar 1 and Madhuri Patil 2 1 M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune

More information

Best Customer Services among the E-Commerce Websites A Predictive Analysis

Best Customer Services among the E-Commerce Websites A Predictive Analysis www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page No. 17088-17095 Best Customer Services among the E-Commerce Websites A Predictive

More information

Domain name system black list false reporting attack

Domain name system black list false reporting attack Domain name system black list false reporting attack Ing. Miloš Očkay, PhD 1, Ing. Martin Javurek 2, 1 Department of Informatics Armed Forces Academy of gen. M. R. Štefánik Liptovský Mikuláš, Slovakia

More information

SPAM PRECAUTIONS: A SURVEY

SPAM PRECAUTIONS: A SURVEY International Journal of Advanced Research in Engineering ISSN: 2394-2819 Technology & Sciences Email:editor@ijarets.org May-2016 Volume 3, Issue-5 www.ijarets.org EMAIL SPAM PRECAUTIONS: A SURVEY Aishwarya,

More information

A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm

A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm S.Pradeepkumar*, Mrs.C.Grace Padma** M.Phil Research Scholar, Department of Computer Science, RVS College of

More information

WITH INTEGRITY

WITH INTEGRITY EMAIL WITH INTEGRITY Reaching for inboxes in a world of spam a white paper by: www.oprius.com Table of Contents... Introduction 1 Defining Spam 2 How Spam Affects Your Earnings 3 Double Opt-In Versus Single

More information

INTERNATIONAL JOURNAL OF MERGING TECHNOLOGY AND ADVANCED RESEARCH IN COMPUTING ON MULTIMEDIA CONTENT TRUST MODELING APPROACHES SOCIAL TAGGING

INTERNATIONAL JOURNAL OF MERGING TECHNOLOGY AND ADVANCED RESEARCH IN COMPUTING ON MULTIMEDIA CONTENT TRUST MODELING APPROACHES SOCIAL TAGGING ON MULTIMEDIA CONTENT TRUST MODELING APPROACHES SOCIAL TAGGING [1] Soppari Swapna M.Tech(CSE) Sree Dattha Institute Of Engineering & Sciences, Hyd [2] L ROSHINI Assistant professor Computer Science Department

More information

A Novel Architecture of Parallel Multiplier Using Modified Booth s Recoding Unit and Adder for Signed and Unsigned Numbers

A Novel Architecture of Parallel Multiplier Using Modified Booth s Recoding Unit and Adder for Signed and Unsigned Numbers International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 8, August 2015, PP 55-61 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Architecture of Parallel

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:

More information

Using AdaBoost and Decision Stumps to Identify Spam

Using AdaBoost and Decision Stumps to Identify Spam Using AdaBoost and Decision Stumps to Identify Spam E-mail Tyrone Nicholas June 4, 2003 Abstract An existing spam e-mail filter using the Naive Bayes decision engine was retrofitted with one based on the

More information

Topological Design of Minimum Cost Survivable Computer Communication Networks: Bipartite Graph Method

Topological Design of Minimum Cost Survivable Computer Communication Networks: Bipartite Graph Method Topological Design of Minimum Cost Survivable Computer Communication Networks: Bipartite Graph Method Kamalesh V.N Research Scholar, Department of Computer Science and Engineering, Sathyabama University,

More information

FUZZY LOGIC WITH ENGINEERING APPLICATIONS

FUZZY LOGIC WITH ENGINEERING APPLICATIONS FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY

More information

Image Spam. Introduction. Project description:

Image Spam. Introduction. Project description: Image Spam Introduction Image spam is a kind of E-mail spam where the message text of the spam is presented as a picture in an image file. Since most modern graphical E-mail client software will render

More information

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics Helmut Berger and Dieter Merkl 2 Faculty of Information Technology, University of Technology, Sydney, NSW, Australia hberger@it.uts.edu.au

More information

A study of classification algorithms using Rapidminer

A study of classification algorithms using Rapidminer Volume 119 No. 12 2018, 15977-15988 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A study of classification algorithms using Rapidminer Dr.J.Arunadevi 1, S.Ramya 2, M.Ramesh Raja

More information

TECHNIQUES FOR COMPONENT REUSABLE APPROACH

TECHNIQUES FOR COMPONENT REUSABLE APPROACH TECHNIQUES FOR COMPONENT REUSABLE APPROACH Sukanay.M 1, Biruntha.S 2, Dr.Karthik.S 3, Kalaikumaran.T 4 1 II year M.E SE, Department of Computer Science & Engineering (PG) sukanmukesh@gmail.com 2 II year

More information

Panda Security. Protection. User s Manual. Protection. Version PM & Business Development Team

Panda Security.  Protection. User s Manual.  Protection. Version PM & Business Development Team Panda Security Email Protection Email Protection PM & Business Development Team User s Manual Version 4.3.2-2 1 Table of Contents Table of Contents... 2 1. Introduction to Email Protection... 3 2. Email

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 Cluster Based Speed and Effective Feature Extraction for Efficient Search Engine Manjuparkavi A 1, Arokiamuthu M 2 1 PG Scholar, Computer Science, Dr. Pauls Engineering College, Villupuram, India 2 Assistant

More information

TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES

TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES Mu. Annalakshmi Research Scholar, Department of Computer Science, Alagappa University, Karaikudi. annalakshmi_mu@yahoo.co.in Dr. A.

More information

Efficacious Spam Filtering and Detection in Social Networks

Efficacious Spam Filtering and Detection in Social Networks Indian Journal of Science and Technology, Vol 7(S7), 180 184, November 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Efficacious Spam Filtering and Detection in Social Networks U. V. Anbazhagu

More information

A Reputation-based Collaborative Approach for Spam Filtering

A Reputation-based Collaborative Approach for Spam Filtering Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 220 227 2013 AASRI Conference on Parallel and Distributed Computing Systems A Reputation-based Collaborative Approach for

More information

Domain-specific Concept-based Information Retrieval System

Domain-specific Concept-based Information Retrieval System Domain-specific Concept-based Information Retrieval System L. Shen 1, Y. K. Lim 1, H. T. Loh 2 1 Design Technology Institute Ltd, National University of Singapore, Singapore 2 Department of Mechanical

More information

An Experimental Evaluation of Spam Filter Performance and Robustness Against Attack

An Experimental Evaluation of Spam Filter Performance and Robustness Against Attack An Experimental Evaluation of Spam Filter Performance and Robustness Against Attack Steve Webb, Subramanyam Chitti, and Calton Pu {webb, chittis, calton}@cc.gatech.edu College of Computing Georgia Institute

More information

Classification Key Concepts

Classification Key Concepts http://poloclub.gatech.edu/cse6242 CSE6242 / CX4242: Data & Visual Analytics Classification Key Concepts Duen Horng (Polo) Chau Assistant Professor Associate Director, MS Analytics Georgia Tech 1 How will

More information

The Spam Problem. Suresh Ramasubramanian, IBM Joe St Sauver, M 3 AAWG Senior Technical Advisor October 2012 New Delhi

The Spam Problem. Suresh Ramasubramanian, IBM Joe St Sauver, M 3 AAWG Senior Technical Advisor October 2012 New Delhi The Spam Problem Suresh Ramasubramanian, IBM Joe St Sauver, M 3 AAWG Senior Technical Advisor October 2012 New Delhi M 3 AAWG Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity

More information

Ontology Based Search Engine

Ontology Based Search Engine Ontology Based Search Engine K.Suriya Prakash / P.Saravana kumar Lecturer / HOD / Assistant Professor Hindustan Institute of Engineering Technology Polytechnic College, Padappai, Chennai, TamilNadu, India

More information

Analysis of Classifications of Unsolicited Bulk s

Analysis of Classifications of Unsolicited Bulk  s Analysis of Classifications of Unsolicited Bulk Emails Jatinderkumar R. Saini, Apurva A. Desai Abstract In recent times, the problem of Unsolicited Bulk Email (UBE) or commonly known as Spam Email, has

More information

MASTER OF SCIENCE IN COMPUTER SCIENCE

MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Filtering Spam by Using Factors Hyperbolic Trees

Filtering Spam by Using Factors Hyperbolic Trees Filtering Spam by Using Factors Hyperbolic Trees Hailong Hou*, Yan Chen, Raheem Beyah, Yan-Qing Zhang Department of Computer science Georgia State University P.O. Box 3994 Atlanta, GA 30302-3994, USA *Contact

More information

COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES

COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES USING DIFFERENT DATASETS V. Vaithiyanathan 1, K. Rajeswari 2, Kapil Tajane 3, Rahul Pitale 3 1 Associate Dean Research, CTS Chair Professor, SASTRA University,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN: IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 20131 Improve Search Engine Relevance with Filter session Addlin Shinney R 1, Saravana Kumar T

More information

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

A Novel Feature Selection Framework for Automatic Web Page Classification

A Novel Feature Selection Framework for Automatic Web Page Classification International Journal of Automation and Computing 9(4), August 2012, 442-448 DOI: 10.1007/s11633-012-0665-x A Novel Feature Selection Framework for Automatic Web Page Classification J. Alamelu Mangai 1

More information

Classifying and Predicting Spam Messages Using Text Mining in SAS Enterprise Miner Session ID: 2650

Classifying and Predicting Spam Messages Using Text Mining in SAS Enterprise Miner Session ID: 2650 Classifying and Predicting Spam Messages Using Text Mining in SAS Enterprise Miner Session ID: 2650 Mounika Kondamudi, Oklahoma State University Mentored by Balamurugan Mohan, H&R Block SAS and all other

More information

Johnson Controls Foundation Scholarship Program

Johnson Controls Foundation Scholarship Program Johnson Controls Foundation Scholarship Program Several hundred students have been assisted by means of this program in the past. Again this year, we hope that the financial support these scholarships

More information

Study on Classifiers using Genetic Algorithm and Class based Rules Generation

Study on Classifiers using Genetic Algorithm and Class based Rules Generation 2012 International Conference on Software and Computer Applications (ICSCA 2012) IPCSIT vol. 41 (2012) (2012) IACSIT Press, Singapore Study on Classifiers using Genetic Algorithm and Class based Rules

More information

ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS

ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS Radhakrishnan R 1, Karthik

More information

PERSONALIZATION OF MESSAGES

PERSONALIZATION OF  MESSAGES PERSONALIZATION OF E-MAIL MESSAGES Arun Pandian 1, Balaji 2, Gowtham 3, Harinath 4, Hariharan 5 1,2,3,4 Student, Department of Computer Science and Engineering, TRP Engineering College,Tamilnadu, India

More information

EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL

EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL J Naveen Kumar 1, Dr. M. Janga Reddy 2 1 jnaveenkumar6@gmail.com, 2 pricipalcmrit@gmail.com 1 M.Tech Student, Department of Computer Science, CMR Institute of Technology,

More information

Possibility Theory-Based Approach to Spam Detection

Possibility Theory-Based Approach to Spam  Detection 2007 IEEE International Conference on Granular Computing Possibility Theory-Based Approach to Spam Email Detection Dat Tran (1), Wanli Ma (1), Dharmendra Sharma (1), and Thien Nguyen (2) (1) University

More information

Improving Newsletter Delivery with Certified Opt-In An Executive White Paper

Improving Newsletter Delivery with Certified Opt-In  An Executive White Paper Improving Newsletter Delivery with Certified Opt-In E-Mail An Executive White Paper Coravue, Inc. 7742 Redlands St., #3041 Los Angeles, CA 90293 USA (310) 305-1525 www.coravue.com Table of Contents Introduction...1

More information

Chapter-8. Conclusion and Future Scope

Chapter-8. Conclusion and Future Scope Chapter-8 Conclusion and Future Scope This thesis has addressed the problem of Spam E-mails. In this work a Framework has been proposed. The proposed framework consists of the three pillars which are Legislative

More information

Keywords Fuzzy, Set Theory, KDD, Data Base, Transformed Database.

Keywords Fuzzy, Set Theory, KDD, Data Base, Transformed Database. Volume 6, Issue 5, May 016 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Fuzzy Logic in Online

More information

Collaborative Filtering. Doug Herbers Master s Oral Defense June 28, 2005

Collaborative  Filtering. Doug Herbers Master s Oral Defense June 28, 2005 Collaborative E-Mail Filtering Doug Herbers Master s Oral Defense June 28, 2005 Background Spamming the use of any electronic communications medium to send unsolicited messages in bulk E-Mail is the most

More information

INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM

INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India

More information

Smart Test Case Quantifier Using MC/DC Coverage Criterion

Smart Test Case Quantifier Using MC/DC Coverage Criterion Smart Test Case Quantifier Using MC/DC Coverage Criterion S. Shanmuga Priya 1, Sheba Kezia Malarchelvi 2 Abstract Software testing, an important phase in Software Development Life Cycle (SDLC) is a time

More information

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan. Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that

More information

Computer aided mail filtering using SVM

Computer aided mail filtering using SVM Computer aided mail filtering using SVM Lin Liao, Jochen Jaeger Department of Computer Science & Engineering University of Washington, Seattle Introduction What is SPAM? Electronic version of junk mail,

More information

A REVIEW PAPER ON IMAGE SPAM FILTERING

A REVIEW PAPER ON IMAGE SPAM FILTERING International Journal of Latest Trends in Engineering and Technology Vol.(8)Issue(2), pp.307-313 DOI: http://dx.doi.org/10.21172/1.82.042 e-issn:2278-621x A REVIEW PAPER ON IMAGE SPAM FILTERING Sneha Nikam

More information

The Comparison of CBA Algorithm and CBS Algorithm for Meteorological Data Classification Mohammad Iqbal, Imam Mukhlash, Hanim Maria Astuti

The Comparison of CBA Algorithm and CBS Algorithm for Meteorological Data Classification Mohammad Iqbal, Imam Mukhlash, Hanim Maria Astuti Information Systems International Conference (ISICO), 2 4 December 2013 The Comparison of CBA Algorithm and CBS Algorithm for Meteorological Data Classification Mohammad Iqbal, Imam Mukhlash, Hanim Maria

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Copyright Detection System for Videos Using TIRI-DCT Algorithm

Copyright Detection System for Videos Using TIRI-DCT Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5391-5396, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: March 18, 2012 Accepted: June 15, 2012 Published:

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET)

Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) 47 Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) V. D. Ambeth Kumar 1 M. Ramakrishnan 2 1 Research scholar in sathyabamauniversity, Chennai, Tamil Nadu- 600 119, India.

More information

Word Disambiguation in Web Search

Word Disambiguation in Web Search Word Disambiguation in Web Search Rekha Jain Computer Science, Banasthali University, Rajasthan, India Email: rekha_leo2003@rediffmail.com G.N. Purohit Computer Science, Banasthali University, Rajasthan,

More information

Choic Anti-Spam Quick Start Guide

Choic Anti-Spam Quick Start Guide ChoiceMail Anti-Spam Quick Start Guide 2005 Version 3.x Welcome to ChoiceMail Welcome to ChoiceMail Enterprise, the most effective anti-spam protection available. This guide will show you how to set up

More information

GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE

GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE George Anders is a president of Anders Consulting. Between 1975 and 2012 he has been employed by Ontario Hydro and its successor companies in Toronto, Canada.

More information

User Signature Identification and Image Pixel Pattern Verification

User Signature Identification and Image Pixel Pattern Verification Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image

More information

URL ATTACKS: Classification of URLs via Analysis and Learning

URL ATTACKS: Classification of URLs via Analysis and Learning International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 3, June 2016, pp. 980 ~ 985 ISSN: 2088-8708, DOI: 10.11591/ijece.v6i3.7208 980 URL ATTACKS: Classification of URLs via Analysis

More information

Spam Classification Documentation

Spam Classification Documentation Spam Classification Documentation What is SPAM? Unsolicited, unwanted email that was sent indiscriminately, directly or indirectly, by a sender having no current relationship with the recipient. Objective:

More information

2014, IJARCSSE All Rights Reserved Page 303

2014, IJARCSSE All Rights Reserved Page 303 Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Software

More information

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage GFI Product Comparison GFI MailEssentials vs PureMessage GFI MailEssentials Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing emails Scans internal emails within

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Identifying Layout Classes for Mathematical Symbols Using Layout Context

Identifying Layout Classes for Mathematical Symbols Using Layout Context Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi

More information